Have You Heard The Latest From Microsoft? Time for a Surprise!

Windows 10. Yes, you heard that right. Windows 10! Are you thinking the same thing we’re thinking? “What happened to Windows 9? Wait, Windows 8 just came out not that long ago…” No worries: we are several months, if not a couple of years away from Windows 10 becoming something you need to be thinking […]

read more »

Is Your Internet Browser Going BERserk?

Are you using Chrome or Firefox to browse the Internet? If so, IMMEDIATELY make sure you’ve got the latest updates for these Internet browsers. Why? A very dangerous security flaw has been identified that lets hackers and malware skip over the Secure Sockets Layer (SSL) of Google Chrome and Firefox. SSL is widely used security […]

read more »

Your Thermostat Can Be A Gateway For Criminals To Break Into Your Home

We truly live in a smart world, don’t we? How many “smart” devices do you use every day to take care of your daily routines automatically? Between your home and your #business, probably quite a few, and that number will only grow year after year as new technologies are developed to save time and effort. […]

read more »

Caution: Watch Out for Shellshock, the Latest Vulnerability That’s Spreading Rapidly!

Could Potentially Be More Dangerous Than the Infamous Heartbleed! A major vulnerability, CVE-2014-6271, has been spreading rapidly and impacting a wide range of businesses. CVE-2014-6271, also known as “shellshock,” impacts “bash” software, which is used in most business computers. According to some researchers, shellshock could potentially be more dangerous than heartbleed, the open/SSL bug that […]

read more »

Security Warning: Your Computer Systems May Be at Risk for Exploitation Due to the Dangerous “Bash” Vulnerability!

A major high severity vulnerability, CVE-2014-6271, has been spreading quickly and impacting a wide range of businesses! The vulnerability, also known as “bash,” involves a UNIX type command shell that’s included in most distributions of Apple OS X and Linux. So how does the vulnerability work? An attacker is able to exploit the vulnerability, then […]

read more »

Your Top Brisbane Information Services Consulting Company